Cyber-security trust model through adaptive cloud authentication protocol for web application

被引:0
|
作者
Alsuwat, Hatim [1 ]
机构
[1] Umm Al Qura Univ, Coll Comp & Informat Syst, Dept Comp Sci, Mecca, Saudi Arabia
关键词
cyber-security; structure learning; Bayesian network; machine learning; adaptive cloud authentication protocol; support vector machine and adaptive fuzzy-based genetic algorithm; CRYPTOGRAPHY;
D O I
10.1117/1.JEI.32.4.042109
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The development and growth of internet-based technologies brings challenges in cyber-security from cyberattack organizations. It is necessary to develop an appropriate cyber-security scheme through a structured machine learning algorithm implemented in the cloud architecture. The aim of our research is to design a cloud-based architecture using an adaptive cloud authentication protocol to develop the trust model for cyber-security systems. Here, the structure learning of Bayesian networks (SL_BN) is developed with an ensemble architecture of machine learning that is integrated with the support vector machine and adaptive fuzzy-based genetic algorithm (SVM_AFGA). The fuzzy logic sets rules for using web applications at the authorized web address. The experimental results show that parametric analysis based on the cyber-security authentication model is based on median delay, transmission level overhead, and security of the network. Moreover, the parameters based on the SL-BN ensemble architecture are average runtime, accuracy, and network efficiency. (c) 2023 SPIE and IS&T
引用
收藏
页数:19
相关论文
共 50 条
  • [21] Grid Cyber-Security Strategy in an Attacker-Defender Model
    Chen, Yu-Cheng
    Mooney, Vincent John, III
    Grijalva, Santiago
    [J]. CRYPTOGRAPHY, 2021, 5 (02)
  • [22] Towards Reproducible Cyber-Security Research through Complex Node Automation
    Abt, Sebastian
    Stampp, Reinhard
    Baier, Harald
    [J]. 2015 7TH INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS), 2015,
  • [23] Application of a Robust Control Algorithm for Satellite Cyber-Security and System Resilience
    Sells, Ray
    Fennell, Michael
    [J]. 2017 IEEE AEROSPACE CONFERENCE, 2017,
  • [24] Short Paper Data Log Management for Cyber-Security Programmability of Cloud Services and Applications
    Carrega, Alessandro
    Repetto, Matteo
    [J]. PROCEEDINGS OF THE 1ST ACM WORKSHOP ON WORKSHOP ON CYBER-SECURITY ARMS RACE (CYSARM '19), 2019, : 47 - 52
  • [25] The World "Wild" Web: Cyber-Security Intelligence Gathering Opportunities from the "Dark" Side
    French, Tim
    Epiphaniou, Gregory
    [J]. LISS 2013, 2015, : 1265 - 1270
  • [26] Mean-Field-Game Model for Botnet Defense in Cyber-Security
    V. N. Kolokoltsov
    A. Bensoussan
    [J]. Applied Mathematics & Optimization, 2016, 74 : 669 - 692
  • [27] Toward Cyber-Security Architecture Framework for Developping Countries: An Assessment Model
    Nguyen Ai Viet
    Le Quang Minh
    Doan Huu Hau
    Nguyen Ngoc Tuan
    Nguyen Nhat Quang
    Nguyen Dinh Chinh
    Nguyen Van Luc
    Pham Thanh Dat
    [J]. ADVANCES IN INFORMATION AND COMMUNICATION TECHNOLOGY, 2017, 538 : 652 - 658
  • [28] Towards Developing a formal model for tracking Cyber-Security Investments in Jamaica
    Brown, Claston
    Thorpe, Sean
    [J]. SOUTHEASTCON 2023, 2023, : 883 - 888
  • [29] Attack and defense in the layered cyber-security model and their (1 ± ε)-approximation schemes
    Mukdasanit, Supachai
    Kantabutra, Sanpawat
    [J]. JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2021, 115 : 54 - 63
  • [30] Improving Radioactive Material Localization by Leveraging Cyber-Security Model Optimizations
    Sheatsley, Ryan
    Durbin, Matthew
    Lintereur, Azaree
    McDaniel, Patrick
    [J]. IEEE SENSORS JOURNAL, 2021, 21 (08) : 9994 - 10006